This document discusses database security. It begins by stating that as threats to databases have increased, security of databases is increasingly important. It then defines database security as protecting the confidentiality, integrity, and availability of database data. The document outlines some common database security threats like SQL injection, unauthorized access, password cracking, and network eavesdropping. It then discusses some methods of securing databases, including through firewalls and data encryption. Firewalls work by filtering database traffic according to rules, while data encryption scrambles data so it can only be read by authorized users. The document stresses the importance of restricting database access to authorized users and applications.
what is security of database system
how we can handle database security
how database security can be check
what are the countermeasures of database security
Database security is an important topic in DBMS course. This is my group presentation of this course. We discus three are security aspects, security problems, security controls, database and firewall.
If you really want to understand what exactly Database Security is all about,this presentation is yours.
You will understand it just by having one look at the slides.
Presentation contains things which are really simple to understand.
what is security of database system
how we can handle database security
how database security can be check
what are the countermeasures of database security
Database security is an important topic in DBMS course. This is my group presentation of this course. We discus three are security aspects, security problems, security controls, database and firewall.
If you really want to understand what exactly Database Security is all about,this presentation is yours.
You will understand it just by having one look at the slides.
Presentation contains things which are really simple to understand.
Overview To Database Security.
What is Database Security
Why need of database security.
Concepts of Database Security.
Security Problems
Security Controls
In today’s world, we need everything secured whether it is your mobile phone , computer , vehicle or almost anything.
What is database security?
Database
It is a collection of information stored in a computer.
Security:
It is being free from danger.
Database Security:
It is the mechanisms that protect the database against intentional or accidental threats.
Database Security is defined as the process by which “Confidentiality,
Integrity and Availability” of the database can be protected
Why need of database security?If there is no security to database what happens???
Data will be easily corrupted
It is important to restrict access to the database from authorized users to protect sensitive data.
Concepts of Database SecurityThree are 3 main aspects
Secrecy or Confidentiality
Integrity
Availability
SECRECY /It is protecting the database from unauthorized users.
Ensures that users are allowed to do the things they are trying to do.
Encryption is a technique or a process by which the data is encoded in such a way that only that authorized users are able to read the data.
INTEGRITYProtecting the database from authorized users.
Ensures that what users are trying to do is correct.
For examples,
An employee should be able to modify his or her own information.
AVAILABILITYDatabase must have not unplanned downtime.
To ensure this ,following steps should be taken
Restrict the amount of the storage space given to each user in the database.
Limit the number of concurrent sessions made available to each
database user.
Back up the data at periodic intervals to ensure data recovery in case of application users.
Slides present data and information system. In any information system security and integrity is the prime concern. How we can make sure stored data is more secure and generated information should be accurate, reliable and consistent.
From the outset, Oracle has delivered the industry's most advanced technology to safeguard data where it lives—in the database. Oracle provides a comprehensive portfolio of security solutions to ensure data privacy, protect against insider threats, and enable regulatory compliance for both Oracle and non-Oracle Databases. With Oracle's powerful database activity monitoring and blocking, privileged user and multi-factor access control, data classification, transparent data encryption, consolidated auditing and reporting, secure configuration management, and data masking, customers can deploy reliable data security solutions that do not require any changes to existing applications, saving time and money.
SQL injection is a code injection technique, used to attack data-driven applications,
in which malicious SQL statements are inserted into an entry field for execution.
This is a method to attack web applications that have a data repository.The
attacker would send a specially crafted SQL statement that is designed to cause
some malicious action.SQL injection is an attack technique that exploits a security
vulnerability occurring in the database layer of an application and a service. This
is most often found within web pages with dynamic content.
Best Practices for implementing Database Security Comprehensive Database Secu...Kal BO
Best Practices for implementing Database Security
Comprehensive Database Security
Saikat Saha
Product Director
Database Security, Oracle
October 02, 2017
Modern Data Security for the Enterprises – SQL Server & Azure SQL DatabaseWinWire Technologies Inc
The webinar talked about the layers of data protection, important security features, potential scenarios in which these features can be applied to limit exposure to security threats and best practices for securing business applications and data. We covered following topics on SQL Server 2016 and Azure SQL Database security features
• Access Level Control
• Data Encryption
• Monitoring
Overview To Database Security.
What is Database Security
Why need of database security.
Concepts of Database Security.
Security Problems
Security Controls
In today’s world, we need everything secured whether it is your mobile phone , computer , vehicle or almost anything.
What is database security?
Database
It is a collection of information stored in a computer.
Security:
It is being free from danger.
Database Security:
It is the mechanisms that protect the database against intentional or accidental threats.
Database Security is defined as the process by which “Confidentiality,
Integrity and Availability” of the database can be protected
Why need of database security?If there is no security to database what happens???
Data will be easily corrupted
It is important to restrict access to the database from authorized users to protect sensitive data.
Concepts of Database SecurityThree are 3 main aspects
Secrecy or Confidentiality
Integrity
Availability
SECRECY /It is protecting the database from unauthorized users.
Ensures that users are allowed to do the things they are trying to do.
Encryption is a technique or a process by which the data is encoded in such a way that only that authorized users are able to read the data.
INTEGRITYProtecting the database from authorized users.
Ensures that what users are trying to do is correct.
For examples,
An employee should be able to modify his or her own information.
AVAILABILITYDatabase must have not unplanned downtime.
To ensure this ,following steps should be taken
Restrict the amount of the storage space given to each user in the database.
Limit the number of concurrent sessions made available to each
database user.
Back up the data at periodic intervals to ensure data recovery in case of application users.
Slides present data and information system. In any information system security and integrity is the prime concern. How we can make sure stored data is more secure and generated information should be accurate, reliable and consistent.
From the outset, Oracle has delivered the industry's most advanced technology to safeguard data where it lives—in the database. Oracle provides a comprehensive portfolio of security solutions to ensure data privacy, protect against insider threats, and enable regulatory compliance for both Oracle and non-Oracle Databases. With Oracle's powerful database activity monitoring and blocking, privileged user and multi-factor access control, data classification, transparent data encryption, consolidated auditing and reporting, secure configuration management, and data masking, customers can deploy reliable data security solutions that do not require any changes to existing applications, saving time and money.
SQL injection is a code injection technique, used to attack data-driven applications,
in which malicious SQL statements are inserted into an entry field for execution.
This is a method to attack web applications that have a data repository.The
attacker would send a specially crafted SQL statement that is designed to cause
some malicious action.SQL injection is an attack technique that exploits a security
vulnerability occurring in the database layer of an application and a service. This
is most often found within web pages with dynamic content.
Best Practices for implementing Database Security Comprehensive Database Secu...Kal BO
Best Practices for implementing Database Security
Comprehensive Database Security
Saikat Saha
Product Director
Database Security, Oracle
October 02, 2017
Modern Data Security for the Enterprises – SQL Server & Azure SQL DatabaseWinWire Technologies Inc
The webinar talked about the layers of data protection, important security features, potential scenarios in which these features can be applied to limit exposure to security threats and best practices for securing business applications and data. We covered following topics on SQL Server 2016 and Azure SQL Database security features
• Access Level Control
• Data Encryption
• Monitoring
Database-as-a-service (DbaaS) is a cloud computing service model that provides users with some form of access to a database without the need for setting up physical hardware, installing software or configuring for performance. All of the administrative tasks and maintenance are taken care of by the service provider and the user or the application owner needs to do is to use the database. The outsourcing of data can lead to confidentiality and integrity issues and also privilege escalation.
Locking Down Your Data: Best Practices for Database SecurityFredReynolds2
Database security is a set of practices and technologies used to secure database management systems against malicious cyber-attacks and unauthorized access. Ensuring a database is intricate because it requires knowledge of multiple areas of information security, including application security, data security, and endpoint security.
Moreover, Database Security is the safeguarding of sensitive data and the prevention of data loss. Database Administrator (DBA) is responsible for ensuring database security.
Introduction All research reports begin with an introduction. (.docxvrickens
Introduction
All research reports begin with an introduction. (1 – 2 Pages)
Background
Provide your reader with a broad base of understanding of the research topic. The goal is to give the reader an overview of the topic, and its context within the real world, research literature, and theory. (3 – 5 Pages)
Problem Statement
This section should clearly articulate how the study will relate to the current literature. This is done by describing findings from the research literature that define the gap. Should be very clear what the research problem is and why it should be solved. Provide a general/board problem and a specific problem (150 – 200 Words)
Literature Review
Using your annotated bibliography, construct a literature review. (5-10 pages)
Discussion
Provide a discussion about your specific topic findings. Using the literature, you found, how do you solve your problem? How does it affect your general/board problem? (3-5 pages)
References
1. Web Application Security; by Vincent Liu, Bryan Sullivan; Publisher: McGraw-Hill; Release Date: November 2011
https://www.oreilly.com/library/view/web-application-security/9780071776165/
2. Veracode; Web Application Security Standards; May 09, 2019
https://www.veracode.com/security/web-application-security-standards
3. Gofore; Web Application Security Requirements » Gofore; July 12, 2018
https://gofore.com/en/web-application-security-requirements-2/
4. Information Security; IT Security Standard: Web Applications - Security Vulnerabilities
https://security.calpoly.edu/content/standards/web-app-vulnerabilities
5. GitHub; OWASP/ASVS; May 27, 2019
https://github.com/OWASP/ASVS
6. KeyCDN; 11 Web Application Security Best Practices; June 02, 2019
https://www.keycdn.com/blog/web-application-security-best-practices
7. Software Integrity Blog; 3 Tips to Ramp Up Your Web Application Security | Synopsys; May 29, 2019
https://www.synopsys.com/blogs/software-security/ramp-up-your-web-application-security/
8. CompliancePoint; Web Application Testing;
https://www.compliancepoint.com/web-application-testing
9. Holm Security; Web Application Security (WAS)
https://www.holmsecurity.com/web-application-security-was
10. Information Security Buzz; The State Of Web Application Vulnerabilities In 2018; January 30, 2019
https://www.informationsecuritybuzz.com/articles/the-state-of-web-application-vulnerabilities-in-2018/
Introduction
Application Security management is an important feature of security in IT environment at enterprise level. Application Security is the implementation of join more aspects or functionality to software to block an area of uncommon threats. These are included of sensitive date breaches or Information or Data theft/steal situations, Denial of Service attacks and other Cyber Attacks.
Web applications are vulnerable to charges that may result in presentation or diminishing of sensitive data, or effect on accessibility of an authorized users like administrators, special users, Application tes ...
Data is one of the important elements for any organization. As
we know that database is collection of data and programs to
perform operations on that data. So for the successful run for
any organization we have to secure our data. So in this paper
We have to focus on threats related to database as well as
several algorithms related to database security. Databases
have the highest rate of breaches among all business assets,
according to the 2012 Verizon Data Breach Report. Verizon
reported that 96% of records breached are from databases,
and the Open Security Foundation revealed that 242.6 million
records were potentially compromised in 2012.
Security misconfiguration is the implementation of improper security controls, such as for servers or application configurations, network devices, etc. that may lead to security vulnerabilities. For example, insecure configuration of web applications could lead to numerous security flaws including: Incorrect folder permissions
A presentation of OWASP's top 10 most common web application security flaws. The content in the slides is sourced from various sources listed in the references section.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Database security
1.
2. In this Chapter
Overview To Database Security.
Why need of database security.
What is Database Security
Concepts of Database Security.
Threats to Database and counter measures
Methods of securing database.
Through firewall
Database Abstraction
5/2/2014Database security issues
3. Overview
Threats and risk to database have increased, So there is a need for security of the database.
The majority companies store sensitive data in database. E.g.: Credit card number
If there is no
security to
database what
happens???
Data will be easily corrupted
It is important to restrict access to the
database from authorized users to
protect sensitive data.
5/2/2014Database security issues
4. Security risk to database includes
Unauthorized database users
Unauthorized Database Administrator
Unauthorized access to Database
Unauthorized alternation to available data
Lack of access to Database services
Sensitive data includes
•Bank/Demat accounts
•Credit card, Salary,
Income tax data
•University admissions,
marks/grades
•Land records, licenses
5/2/2014Database security issues
5. Definition of Database Security
Database Security is
defined as the process by
which “Confidentiality,
Integrity and Availability”
of the database can be
protected
5/2/2014Database security issues
7. Confidentiality
Enforced by encrypting the data in the stored database
Encryption is a technique or a process by which the data is
encoded in such a way that only that authorized users are able
to read the data.
Encryption is rendering sensitive data unreadable to
unauthorized users.
5/2/2014Database security issues
8. Integrity
Enforced by defining which user has to be given permission to access the data in the database
For Example:
Data related to employee may have permission for
viewing records and altering only the part of
information like his contact details, where as the
person like Human resource manager will have more
privileges. 5/2/2014Database security issues
9. Availability
Database must have not unplanned downtime.
To ensure this ,following steps should be taken
Restrict the amount of the storage space given to
each user in the database.
Limit the number of concurrent sessions made
available to each database user.
Back up the data at periodic intervals to ensure
data recovery in case of application users.
5/2/2014Database security issues
11. SQL Injection
A form of attack on a database-driven Web site in which the attacker executes
unauthorized SQL commands by taking advantage of insecure code on a system connected to
the Internet, bypassing the firewall
Vulnerabilities:
Poor Input validation to web
application.
Unsafe ,dynamically constructed SQL
commands.
Weak permissions that fail to restrict
the application to Database
Countermeasures
Your application should constrain and sanitize input data
before using it in SQL queries.
Use type safe SQL parameters for data access. These can
be used with stored procedures or dynamically constructed
SQL command strings. Using SQL parameters ensures that
input data is subject to type and length checks
Use a SQL Server login that has restricted permissions in
the database. Ideally, you should grant execute permissions
only to selected stored procedures in the database and
provide no direct table access.
5/2/2014Database security issues
12. Unauthorized Access
Direct access to your database server should be restricted to specific client computers to
prevent unauthorized server access.
Vulnerabilities
Failure to block the SQL Server port at
the perimeter firewall
Lack of IPSec or TCP/IP filtering
policies
Countermeasures
Make sure that SQL Server ports are
not visible from outside of the perimeter
network.
Within the perimeter, restrict direct
access by unauthorized hosts, for
example, by using IPSec or TCP/IP filters.
5/2/2014Database security issues
13. Password cracking
A common first line of attack is to try to crack the passwords of well known account names, such
as SA (the SQL Server administrator account).
Vulnerabilities
Weak or blank passwords
Passwords that contain everyday
words
Countermeasures
Create passwords for SQL Server login
accounts that meet complexity
requirements.
Avoid passwords that contain common
words found in the dictionary.
5/2/2014Database security issues
14. Network Eavesdropping
Eavesdropping refers to unauthorized access of reading messages
The deployment architecture of most applications includes a physical separation of the data
access code from the database server. As a result, sensitive data, such as application-specific
data or database login credentials, must be protected from network eavesdroppers.
Vulnerabilities
Insecure communication channels
Passing credentials in clear text to the database; for
example:
Using SQL authentication instead of Windows
authentication
Using SQL authentication without a server
certificate
Vulnerabilities
Insecure communication channels
Passing credentials in clear text to the database; for
example:
Using SQL authentication instead of Windows
authentication
Using SQL authentication without a server
certificate
5/2/2014Database security issues
16. Methods of securing the database
Authorization - privileges, views.
Authentication – passwords.
Encryption - public key / private
key, secure sockets.
Logical - firewalls, net proxies.
5/2/2014Database security issues
17. Security of the database through
FIREWALLS
A FIREWALL is dedicated software on another computer which inspects network traffic passing
through it and denies (or) permits passage based on set of rules. Basically it is a piece of
software that monitors all traffic that goes from your system to another via the Internet or
network and Vice Versa
Database Firewalls are a type of Web Application Firewalls that monitor databases to identify
and protect against database specific attacks that mostly seek to access sensitive information
stored in the databases.
5/2/2014Database security issues
18. How Database FIREWALL works
The Database Firewalls include a set of pre-defined, customizable security audit policies and they
can identify database attacks based on threat patterns called signatures.
The SQL input statements (or) queries are compared to these signatures, which are updated
frequently by the vendors to identify known attacks on the database.
But all the attacks on the databases may not be familiar.
Database Firewalls build (or come with) white list of approved SQL commands(or) statements that
are safe.
All the input commands are compared with this white list and only those that are already present
in the white list are sent to the database.
5/2/2014Database security issues
20. Advantages of using FIREWALL
Database Firewalls maintains the black list of certain specific and potentially harmful
commands(or) SQL statements and do not allow these type of inputs.
Database Firewalls identifies the database, operating system and protocol vulnerabilities in the
databases and intimate the administrator, who can take steps to patch them.
Database Firewalls monitors for database responses (from the DB server) to block potential data
leakage.
Database Firewalls notifies the suspicious activities, instead of blocking them right away.
Database Firewalls can evaluate factors like IP address, time, location, type of applications
(source), etc from which the abnormal database access requests are emanating and then decide
whether to block them or not, based on these factors as per the policies set by the administrator.
5/2/2014Database security issues
21. Security of the database Through
Abstraction
Data encryption enables to encrypt sensitive data, such as credit card numbers, stored in table
columns.
Encrypted data is decrypted for a database user who has access to the data.
Data encryption helps protect data stored on media in the event that the storage media or data
file gets stolen.
5/2/2014Database security issues
22. How data Encryption Works
Data encryption is a key-based access control system. Even if the encrypted data is retrieved, it
cannot be understood until authorized decryption occurs, which is automatic for users authorized
to access the table.
When a table contains encrypted columns, a single key is used regardless of the number of
encrypted columns. This key is called the column encryption key.
The column encryption keys for all tables, containing encrypted columns, are encrypted with the
database server master encryption key and stored in a dictionary table in the database.
The master encryption key is stored in an external security module that is outside the database
and accessible only to the security administrator.
5/2/2014Database security issues
24. Advantages of Data Encryption
As a security administrator, one can be sure that sensitive data is safe in case the storage media or
data file gets stolen.
You do not need to create triggers or views to decrypt data. Data from tables is decrypted for the
database user.
Database users need not be aware of the fact that the data they are accessing is stored in
encrypted form. Data is transparently decrypted for the database users and does not require any
action on their part.
Applications need not be modified to handle encrypted data. Data encryption/decryption is
managed by the database.
5/2/2014Database security issues
25. Authorization
Read authorization - allows reading, butnot modification of data
Insert authorization - allows insertion of new data, but not modification of existing data.
Update authorization - allows modification, but not deletion of data.
Delete authorization - allows deletion of data
5/2/2014Database security issues
26. Privileges in Database
select: allows read access to relation, or the ability to query using the view
insert: the ability to insert tuples
update: the ability to update using the SQL update statement
delete: the ability to delete tuples.
5/2/2014Database security issues
27. Privilege To Grant Privileges
With grant option:
allows a user who is
granted a privilege to
pass the privilege on to
other users.
Example:
grant select on branch
to U1 with grant option
gives U1 the select
privileges on branch and
allows U1 to grant this
privilege to others
5/2/2014Database security issues